
Security

Cybersecurity has been a challenge from the beginning of IT and it will be until the end. It all started with endpoint and network security, but today we are also dealing with cloud security and training our employees to incorporate good security practices. All these new technologies that help us innovate also help cybercriminals and state-sponsored hackers get new tools that they can use to access our systems and, in the worst cases, gain access to our most valuable data and trade secrets. Moreover, with new legislation such as GDPR, you have to make sure everything is secure or you will not only lose your reputation, but you could also be fined by the government. In short, protecting IT environments is more important than ever.
Timeline

Trend Micro issues Cybersecurity threat predictions for 2021
Forecast indicates that remote and cloud-based systems will be aggressively targeted in the coming year Tr...

Microsoft warns of virus hijacking browser and stealing data
Microsoft has found a virus that creates fake search results and hijacks stored login details. The Windows vi...

Ransomware gangs are cold-calling victims to stop them from using backups
Ransomware gangs have been cold-calling victims if they suspect their targets are attempting to restore their...

PowerPepper malware poses threats to enterprises
The new Windows exploit targets businesses in US, Asia and Europe. Security researchers at Kapersky Labs h...

Ivanti completes acquisition of MobileIron and Pulse Secure
The combination enhances Ivanti’s security offerings. Ivanti has announced it has closed the acquisition...

BlackBerry wants to secure growing number of endpoints at companies
BlackBerry has been committed to securing company endpoints for years. The company particularly does this thr...

Meet Egregor: the next big malware threat to your business
The new group has become the leading ransomware variant, say industry experts. A new ransomware group has ...

Hacker publishes exploits of Fortinet’s FortiGate VPNs
The hacker leaked sensitive details citing Fortinet SSL VPNs vulnerability on a prominent hacker forum. A ...

Ransomware success is driven by victims who pay the ransom
Over a quarter of organizations that have been paralyzed by ransomware attacks choose to pay the ransom. They...

New SEO scam: WordPress malware sets up fake shops on existing sites
Attackers also poison the victim's keywords and SERP ranking. There is a new cybercrime gang at work these...